Vulnerabilities

With the aim of informing, warning and helping professionals with the latest security vulnerabilities in technology systems, we have made a database available for users interested in this information, which is in Spanish and includes all of the latest documented and recognised vulnerabilities.

This repository, with over 75,000 registers, is based on the information from the NVD (National Vulnerability Database) – by virtue of a partnership agreement – through which INCIBE translates the included information into Spanish.

On occasions this list will show vulnerabilities that have still not been translated, as they are added while the INCIBE team is still carrying out the translation process. The CVE  (Common Vulnerabilities and Exposures) Standard for Information Security Vulnerability Names is used with the aim to support the exchange of information between different tools and databases.

All vulnerabilities collected are linked to different information sources, as well as available patches or solutions provided by manufacturers and developers. It is possible to carry out advanced searches, as there is the option to select different criteria to narrow down the results, some examples being vulnerability types, manufacturers and impact levels, among others.

Through RSS feeds or Newsletters we can be informed daily about the latest vulnerabilities added to the repository. Below there is a list, updated daily, where you can discover the latest vulnerabilities.

CVE-2019-25492

Publication date:
27/02/2026
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'pt' parameter. Attackers can send GET requests to the admin/getcmsdata.php endpoint with malicious 'pt' values to extract sensitive database information.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2019-25493

Publication date:
27/02/2026
Homey BNB V4 contains an SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the 'val' parameter. Attackers can send GET requests to the admin/getrecord.php endpoint with malicious 'val' values to extract sensitive database information.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2019-25489

Publication date:
27/02/2026
Homey BNB V4 contains a SQL injection vulnerability that allows unauthenticated attackers to manipulate database queries by injecting SQL code through the hosting_id parameter. Attackers can send GET requests to the rooms/ajax_refresh_subtotal endpoint with malicious hosting_id values to extract sensitive database information or cause denial of service.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2026-2293

Publication date:
27/02/2026
A NestJS application using @nestjs/platform-fastify can allow bypass of authentication/authorization middleware when Fastify path-normalization options are enabled.<br /> <br /> <br /> <br /> This issue affects nest.Js: 11.1.13.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2026-24488

Publication date:
27/02/2026
OpenEMR is a free and open source electronic health records and medical practice management application. In versions up to and including 8.0.0, an arbitrary file exfiltration vulnerability in the fax sending endpoint allows any authenticated user to read and transmit any file on the server (including database credentials, patient documents, system files, and source code) via fax to an attacker-controlled phone number. The vulnerability exists because the endpoint accepts arbitrary file paths from user input and streams them to the fax gateway without path restrictions or authorization checks. As of time of publication, no known patched versions are available.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-25147

Publication date:
27/02/2026
OpenEMR is a free and open source electronic health records and medical practice management application. Prior to version 8.0.0, in `portal/portal_payment.php`, the patient id used for the page is taken from the request (`$pid = $_REQUEST[&amp;#39;pid&amp;#39;] ?? $pid` and `$pid = ($_REQUEST[&amp;#39;hidden_patient_code&amp;#39;] ?? null) &gt; 0 ? $_REQUEST[&amp;#39;hidden_patient_code&amp;#39;] : $pid`) instead of being fixed to the authenticated portal user. The portal session already has a valid `$pid` for the logged-in patient. Overwriting it with user-supplied values and using it without authorization allows a portal user to view and interact with another patient&amp;#39;s demographics, invoices, and payment history—horizontal privilege escalation and IDOR. Version 8.0.0 contains a fix for the issue.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2025-69437

Publication date:
27/02/2026
PublicCMS v5.202506.d and earlier is vulnerable to stored XSS. Uploaded PDFs can contain JavaScript payloads and bypass PDF security checks in the backend CmsFileUtils.java. If a user uploads a PDF file containing a malicious payload to the system and views it, the embedded JavaScript payload can be triggered, resulting in issues such as credential theft, arbitrary API execution, and other security concerns. This vulnerability affects all file upload endpoint, including /cmsTemplate/save, /file/doUpload, /cmsTemplate/doUpload, /file/doBatchUpload, /cmsWebFile/doUpload, etc.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-3277

Publication date:
27/02/2026
The OpenID Connect (OIDC) authentication configuration in PowerShell <br /> Universal before 2026.1.3 stores the OIDC client secret in cleartext in <br /> the .universal/authentication.ps1 script, which allows an attacker with read access to that file to obtain the OIDC client credentials
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-3304

Publication date:
27/02/2026
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability in Multer prior to version 2.1.0 allows an attacker to trigger a Denial of Service (DoS) by sending malformed requests, potentially causing resource exhaustion. Users should upgrade to version 2.1.0 to receive a patch. No known workarounds are available.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2026-2359

Publication date:
27/02/2026
Multer is a node.js middleware for handling `multipart/form-data`. A vulnerability in Multer prior to version 2.1.0 allows an attacker to trigger a Denial of Service (DoS) by dropping connection during file upload, potentially causing resource exhaustion. Users should upgrade to version 2.1.0 to receive a patch. No known workarounds are available.
Severity CVSS v4.0: HIGH
Last modification:
27/02/2026

CVE-2026-2749

Publication date:
27/02/2026
Vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Centroen Open Ticket modules).This issue affects Centreon Open Tickets on Central Server: from all before 25.10.3, 24.10.8, 24.04.7.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026

CVE-2026-2750

Publication date:
27/02/2026
Improper Input Validation vulnerability in Centreon Centreon Open Tickets on Central Server on Linux (Centreon Open Tickets modules).This issue affects Centreon Open Tickets on Central Server: from all before 25.10; 24.10;24.04.
Severity CVSS v4.0: Pending analysis
Last modification:
27/02/2026